scholarly journals Investigating the Throughput Performance of the MPT-GRE Network Layer Multipath Library in Emulated WAN Environment

Author(s):  
Szabolcs Szilágyi ◽  
Imre Bordán

Nowadays there is a growing demand for a much faster and more secure communication without borders through the internet, which is provoking more and more both network designers and manufacturers of communication devices. Thanks to the BYOD trend, our communication devices can be easily carried anywhere in the world. They generally have several built-in network interfaces (e.g. Ethernet, Wi-Fi, 4G). Theoretically, using these cards in parallel, we could speed up data transmission, and thus communication, by aggregating the channel capabilities of the interfaces. On the other hand, we could make data transmission more secure by applying redundancy to the system. Unfortunately, traditional IP-based communications do not allow the use of parallel interfaces in a given communication session, leaving the hardware capabilities of our communications devices virtually untapped. To address this issue, we have developed a multipath communication solution called MPT-GRE, which we have already tested in several laboratory environments. The measurement results were published in our previous articles. In this paper we are going to test it in a much more realistic environment, using the Dummynet WAN emulation software. The measurement results confirmed that the MPT-GRE multipath solution is able to aggregate the performance of physical connections efficiently in the emulated Fast Ethernet IPv4 WAN environment as well.

Author(s):  
Brian L. Keeley

Where does entertaining (or promoting) conspiracy theories stand with respect to rational inquiry? According to one view, conspiracy theorists are open-minded skeptics, being careful not to accept uncritically common wisdom, exploring alternative explanations of events no matter how unlikely they might seem at first glance. Seen this way, they are akin to scientists attempting to explain the social world. On the other hand, they are also sometimes seen as overly credulous, believing everything they read on the Internet, say. In addition to conspiracy theorists and scientists, another significant form of explanation of the events of the world can be found in religious contexts, such as when a disaster is explained as being an “act of God.” By comparing conspiratorial thinking with scientific and religious forms of explanation, features of all three are brought into clearer focus. For example, anomalies and a commitment to naturalist explanation are seen as important elements of scientific explanation, although the details are less clear. This paper uses conspiracy theories as a lens through which to investigate rational or scientific inquiry. In addition, a better understanding of the scientific method as it might be applied in the study of events of interest to conspiracy theorists can help understand their epistemic virtues and vices.


2004 ◽  
Vol 26 (1) ◽  
Author(s):  
Eric Hilgendorf

AbstractAfter some introductory remarks on the German legal system and German legal politics, the main forms of datanet crime on the Internet are sketched. After that, one of the most important Internet-cases of the last decade, the CompuServe case, is discussed in some detail. One of the main problems of datanet crime is its global reach. The world-spanning nature of the cyberspace significantly enlarges the ability of offenders to commit crimes that will affect people in a variety of other countries. On the other hand, the jurisdiction of national criminal law cannot be expanded at will by any single nation. A transnational criminal law for the Internet is possible but should be restricted to the defence of universally (or nearly universally) accepted interests and values. In effect, it seems that the problems of computer-related crime on the Internet cannot be solved by criminal law alone.


2021 ◽  
pp. 133-146
Author(s):  
Maciej Górny

The aim of the article is to present the opportunities and threats resulting from the implementation of voting via the Internet (i-voting) and to discuss the conditions for effective implementation of this alternative voting procedure on the example of Estonia and Switzerland. Estonia is the only country in the world where i-voting is widely used. In Switzerland, on the other hand, this voting method has been used most often, although its use has been suspended for several years due to legal, infrastructural and political problems. What are the conditions for successfully implementing Internet voting? The attempt to answer this research question was possible thanks to the use of the following research methods: comparative, formal-dogmatic, behavioral and modified historical method. The key conclusion is that the implementation of i-voting must be preceded by many years of political, legal, infrastructural and social activities, and that the created system must be as transparent as possible.


2009 ◽  
Vol 61 (3) ◽  
pp. 109
Author(s):  
Ralph L Scott

An antivirus program continuously monitors your computer to detect a virus, which is automatically deleted and/or quarantined. Firewall programs, on the other hand, block access to your computer from the Internet and prevent hackers from planting a worm or other type of malicious software in your computer. Firewalls protect your data, your computer, and your name from corruption. Stories are legion about the Internet being used to seize control of a computer identity to do things such as send out fake e-mails in your name canceling final exams, insulting your boss, and ordering merchandise such as ten pizzas to be delivered to your office. A good firewall will prevent such aremote seizure of your computer.


Author(s):  
Maria E. Velásquez ◽  
Luis A. Velásquez

Abstract A system named Tool Trial System (TTS), which is capable of collating and disseminating information relating to tool trials amongst a variety of user groups, has been developed. In the context of tooling engineers TTS has provided a platform from which it is possible to submit and retrieve highly specific technical tooling data on the World Wide Web. TTS has been developed under a distributed philosophy and it can be downloaded by remote users in the form of Java applets, through any computer with Internet connection and using conventional Java enabled browsers without the requirements of using middle tiers software or hardware between clients and server sides. TTS uses a 100% pure Java driver for remote database access and it was developed using PowerJ, which is a graphical programming tool able to speed up the creation of Java projects. This work demonstrated not only the suitability of the Internet as a distributed computing resource, but more importantly it was possible to look at the ways in which approved data could be analyzed and then applied to cutting data selection within the Process Planning arena.


Author(s):  
Elba del Carmen Valderrama Bahamóndez ◽  
Albrecht Schmidt

The Internet and computers are accessible to only half of the population in the world. For the other half, computers and the Internet are almost alien concepts. This half has no medium for gathering information, and they are computer illiterate. In addition, it is well-known, that the use of computers and the Internet, directly and indirectly, enhance the learning process. Therefore, students from under privileged areas of developing regions of the world are, clearly, at a disadvantage compared to their peers in developed countries. However, mobile phones could change this situation. In developing countries, mobile phones are far more accessible than computers or Internet access. This high accessibility together with the multiple functionalities of mobile phones, allow for the potential to build feasible educational applications that enhance the learning experiences of students in developing countries. Such opportunities enable the students’ experiences to be made proportionate to the other half of the world, with a real mechanism for gathering information.


Author(s):  
Tahir Abbas

The online world is a space for exploring identities, learning more about the ‘other’ and questions of being and becoming in a much wider space than previously understood. This online world of the far right and Islamist is an alternative reality that enables people to promote their own political views. Unreconstructed patriarchy, in the form of an anti-feminist discourse grounded on selective aspects of conservative Islamic and Christian norms, is finding a new voice on the internet, coupled with hate towards the ‘other’, more generally presented as a common enemy to the collective male ‘self’. The individuals attracted to various forums are often reclusive and difficult to identify. The victims in both cases are young men who are angry, enfeebled and distrustful of one another, now morphed into a cyber-realm where their rage finds a voice online, where their digital tribalism gives them new meaning in an otherwise broken and divided world. A crisis of masculinity is at the heart of the malaise facing young men all over the world. Both radical Islamists and the far-right fringes have galvanized in the online space in resistance to neoliberal globalization, their loss of identity and the increasing prominence of women in society.


2016 ◽  
Vol 18 (1) ◽  
pp. 89-115 ◽  
Author(s):  
Umesh Rao Hodeghatta ◽  
Sangeeta Sahney

Purpose – This paper aims to research as to how Twitter is influential as an electronic word-of-mouth (e-WOM) communication tool and thereby affecting movie market. In present days, social media is playing an important role in connecting people around the globe. The technology has provided a platform in the social media space for people to share their experiences through text, photos and videos. Twitter is one such online social networking media that enables its users to send and read text-based messages of up to 140 characters, known as “tweets”. Twitter has nearly 200 million users and billions of such tweets are generated by users every other day. Social media micro-blogging broadcasting networks such as Twitter are transforming the way e-WOM is disseminated and consumed in the digital world. Twitter social behaviour for the Hollywood movies has been assessed across seven countries to validate the two basic blocks of the honeycomb model – sharing and conversation. Twitter behaviour was studied for 27 movies in 22 different cities of seven countries and for six genres with a total tweets of 9.28 million. The difference of Twitter social media behaviour was compared across countries, and “sharing” and “conversation” as two building blocks of the honeycomb model were studied. t-Test results revealed that the behaviour is different across countries and across genres. Design/methodology/approach – The objective of the paper is to analyse Twitter messages on an entertainment product (movies) across different regions of the world. Hollywood movies are released across different parts of the world, and Twitter users are also in different parts of the world. The objective is to hence validate “conversation” and “sharing” building blocks of the honeycomb model. The research is confined to analysing Twitter data related to a few Hollywood movies. The tweets were collected across nine different cities spanning four different countries where English language is prominent. To understand the Twitter social media behaviour, a crawler application using Python and Java was developed to collect tweets of Hollywood movies from the Twitter database. The application has incorporated Twitter application programming interfaces (APIs) to access the Twitter database to extract tweets according to movies search queries across different parts of the world. The searching, collecting and analysing of the tweets is a rather challenging task because of various reasons. The tweets are stored in a Twitter corpus and can be accessed by the public using APIs. To understand whether tweets vary from one country to another, the analysis of variance test was conducted. To assess whether Twitter behaviour is different, and to compare the behaviour across countries, t-tests were conducted taking two countries at a time. The comparisons were made across all the six genres. In this way, an attempt was made to obtain a microscopic view of the Twitter behaviour for each of the seven countries and the six genres. Findings – The findings show that the people use social media across the world. Nearly 9.28 million tweets were from seven countries, namely, USA, UK, Canada, South Africa, Australia, India and New Zealand for 27 Hollywood movies. This is indicative of the fact that today, people are exchanging information across different countries, that people are conversing about a product on social media and people are sharing information about a product on social media and, thus, proving the hypothesis. Further, the results indicate that the users in USA, Canada and UK, tweet more than the other countries, USA and UK being the highest in tweets followed by the Canada. On the other hand, the number of tweets in Australia, India and South Africa are low with New Zealand being the lowest of all the countries. This indicates that different countries’ users have different social media behaviour. Some countries use social media to communicate about their experience more than in some other country. However, consumers from all over the world are using Twitter to express their views openly and freely. Originality/value – This research is useful to scholars and enterprises to understand opinions on Twitter social media and predict their impact. The study can be extended to any products which can lead to better customer relationship management. Companies can use the Internet and social media to promote and get feedback on their products and services across different parts of the world. Governments can inform the public about their new policies, benefits of governmental programmes to people and ways to improve the Internet reach to more people and also for creating awareness about health, hygiene, natural calamities and safety.


2021 ◽  
Vol 34 (1) ◽  
pp. 68-85
Author(s):  
Henry Egbezien Inegbedion

Purpose The purpose of this paper is to investigate the nature of the inequalities in the usage of the internet and inequalities in the growth rate in the usage of the internet, and thus ascertain the possibility of convergence of the digital divide between the major regions of the world. Design/methodology/approach The design was a longitudinal study of the usage of internet and growth rate in the usage of the internet in the different regions of the world for the period 2009–2019. The quantitative research method was used. Simple percentages and F-test were used in data analysis. Findings The usage of internet in Asia and Europe is higher than all the other regions in the world but there is no significant difference in usage between the other regions. The results further showed that some of the digitally disadvantaged regions had higher growth rates in the usage of the internet and these digitally disadvantage states are not disadvantaged in access to smartphones and the emerging 5G technology, thus suggesting the possibility of imminent convergence in access to the internet given the increasing usage of smartphones for the internet subscription. Research limitations/implications The focus on internet usage in the major regions of the world without recourse to the variability of the usage and growth rate of internet usage within the regions. The dearth of the empirical literature on quantitative research on the research problem was another constraint. Finally, restriction in available statistics on digital divide constrained the use of 2009–2019 as the periodic scope of the study. Practical implications Inclusion of ICT in the school curricula of the component states to acquaint them with information and communication technology (ICT) usage at an early stage, as well as provision of the enabling environment for business to thrive and through a national culture that will encourage businesses to be vibrant, and thus lay a foundation for future convergence. Social implications Enhancement in employment opportunities through the increased investment in the ICT facilities and the subsequent reduction in social vices. Originality/value Use of secondary data through a longitudinal design to categorically indicate the differences between the different regions of the world in terms of internet usage, as well as the empirical determination of the discrepancies between the growth rates in the access to internet and usage of internet by different regions of the world, especially as regard some of the digitally disadvantaged regions having higher growth rates in the usage of the internet than the perceived digitally advantaged regions.


Author(s):  
Ye-Sho Chen ◽  
Chuanlan Liu ◽  
Qingfeng Zeng

Franchising as a global growth strategy is gaining its popularity (Justis and Judd, 2002; Thomas and Seid, 2000; Chen and Justis, 2006). For example, the U.S. Commercial Service estimated that China, having over 2,600 brands with 200,000 franchised retail stores in over 80 sectors, is now the largest franchise market in the world (U.S. Commercial Service, 2008). The popularity of franchising continues to increase, as we witness an emergence of a new e-business model, Netchising, which is the combination power of the Internet for global demand-and-supply processes and the international franchising arrangement for local responsiveness (Chen, Justis, and Yang, 2004; Chen, Chen, and Wu, 2006). For example, Entrepreneur magazine – well known for its Franchise 500 listing – in 2001 included Tech Businesses into its Franchise Zone that contains Internet Businesses, Tech Training, and Miscellaneous Tech Businesses. At the time of this writing, 45 companies are on its list. In his best seller, Business @ the Speed of Thought, Bill Gates (1999) wrote: “Information Technology and business are becoming inextricably interwoven. I don’t think anybody can talk meaningfully about one without talking about the other.” (p. 6) Gates’ point is quite true when one talks about e-business strategy in franchising. Thus, to see how e-business can be “meaningfully” used in franchising, one needs to know how franchising really works.


Sign in / Sign up

Export Citation Format

Share Document